NEWS

Hybrid workplace presents security challenges and opportunities

“Securing the New Hybrid Workplace” report from Entrust found 91% of employees are in favor of a hybrid work environment, but cite challenges to security and productivity.

Read More

NEWS

'Enterprising' criminals are selling direct access to cloud accounts

Lacework, the data-driven security platform for the cloud, has released its quarterly cloud threat report, unveiling the new techniques and avenues cybercriminals are infiltrating to profit from businesses.

Read More

NEWS

Password recycling risk

62% of employees reuse passwords across business and personal accounts, with 70% of leaders concerned about the issue.

Read More

NEWS

Beyond Identity and Ignition Technology form strategic distribution partnership

Beyond Identity selects Ignition Technology to drive channel expansion in the Nordics and Benelux.

Read More

NEWS

Organisations trust Zero Trust

Despite staggering interest, a top barrier to implementing Zero Trust strategies is, surprisingly, concern over employees feeling trusted by their employer.

Read More

NEWS

‘Law enforcement slows down ransomware recovery’ say 45 percent of security professionals

Study reveals why companies don’t inform law enforcement about ransomware infections and how insurance pay outs could be fuelling more attacks.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
44% of enterprises have a security team within their wider IT department.
Lieberman Software Corporation has formed a new partnership and product integration with...
MSP re-certifies against the Cloud Industry Forum’s Code of Practice.
Technology integration between Tenable and CyberArk delivers market-defining continuous network...
Despite eight out of ten IT decision makers experiencing a data or cyber security breach in...
The year 2015 has become widely referred to as the year of the data breach. What nefarious...